Efficient Unrestricted Identity-Based Aggregate Signature Scheme

被引:8
|
作者
Yuan, Yumin [1 ]
Zhan, Qian [2 ]
Huang, Hua [3 ]
机构
[1] Xiamen Univ Technol, Sch Appl Math, Xiamen, Peoples R China
[2] Univ Sci & Technol Beijing, Beijing 100083, Peoples R China
[3] Xiamen Univ, Xiamen, Peoples R China
来源
PLOS ONE | 2014年 / 9卷 / 10期
关键词
AUTHENTICATION;
D O I
10.1371/journal.pone.0110100
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. PLOS ONE, 2015, 10 (05):
  • [2] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [3] An efficient provable security identity-based proxy aggregate signature scheme
    Guo, Lei
    Hu, Defa
    [J]. International Journal of Applied Mathematics and Statistics, 2013, 51 (23): : 212 - 222
  • [4] IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    Xu, Chungen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6401 - 6413
  • [5] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    [J]. Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [6] EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack
    Xie, Yong
    Xu, Fang
    Li, Xiang
    Zhang, Songsong
    Zhang, Xiaodan
    Israr, Muhammad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (03): : 903 - 924
  • [7] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    [J]. INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [8] An improved efficient identity-based quantum signature scheme
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 22 (01)
  • [9] A secure and efficient identity-based quantum signature scheme
    Liu, Bai
    Zhu, Pengda
    Guo, Kuikui
    [J]. AIP ADVANCES, 2024, 14 (06)
  • [10] An improved efficient identity-based quantum signature scheme
    Yongfei Huang
    Guangxia Xu
    Xiaoling Song
    [J]. Quantum Information Processing, 22